How does Active IQ Unified Manager detect ransomware on ONTAP and trigger event "Ransomware activities detected"?
Applies to
- Active IQ Unified Manager (AIQUM)
- ONTAP 9
Answer
- AIQUM event Ransomware activities detected is NOT based on cluster configuration data collected from ONTAP every 15 minutes
- Ransomware activities detected is based on EMS event
callhome.arw.activity.seen
on the ONTAP side - When EMS event
callhome.arw.activity.seen
is generated, the event is notified to AIQUM due to the default event notification configuration on ONTAP
cluster1::*> event notification destination show -type rest-api
Name Type Destination
-------------- ---------- ---------------------
192-168-0-71_server
rest-api https://192.168.0.71:9443/acq/ontap/ems
- After receiving the notification, AIQUM collects the details of the event from ONTAP via API, and generates AIQUM event Ransomware activities detected
Additional Information
When are EMS/ASUP alert notifications being generated for 'callhome.arw.activity.seen'?